The Obama administration has unveiled a federal cybersecurity workforce strategy that calls for identifying, recruiting, developing, retaining and expanding "the best, brightest and most diverse cybersecurity talent" for federal service. But are those goals realistic?
The Department of Health and Human Services' Office for Civil Rights has notified 167 covered entities they've been selected for remote "desk audits" of their HIPAA compliance. But the audits will focus on only a handful of requirements.
Pokémon Go - Nintendo's new smartphone app - has been a smash hit. But the game's augmented-reality approach, and app developers' data-handling choices, have triggered security and privacy concerns as well as safety warnings.
Many healthcare organizations embark on cloud migrations
to achieve scalability, cost-efficiency, and higher application
performance. But migrating applications to the cloud can be a
complex process that requires careful planning and deliberation.
Maintaining HIPAA compliance and maximizing PHI security...
Evolving criminal and unscrupulous internal threats to healthcare
data networks continue to plant seeds of fear and uncertainty
in the minds of healthcare IT professionals. Those fears are wellfounded;
a recent Information Week survey found that 91 percent
of small healthcare practices in North America say they...
In the on-prem world, companies needed experts for each major area of IT provenance: hardware, networking, systems administration, security, operating systems, virtualization, workload balancing, data integration, data cleansing and quality, and then all the function-specific applications that drive everyday business...
Advanced threats are pervasive, and difficult to detect and contain. A key component to advance threat protection is a sandbox. Before you take the step to enhance your advanced threat protection, it's important to take the time to select the right sandbox for you. Read the Forrester report to find out best practices...
In the wake of the Hillary Clinton email controversy, organizations need to be more aware of the risks of unsanctioned "shadow IT" and take appropriate mitigation steps, says security expert Mac McMillan.
With the rush to deliver more services through digital channels, the ability to balance convenience and security across the customer lifecycle is critical. Today, more than 60% of fraud attempts originate in the mobile channel, and mobile transactions present more risk than those that originate from the Web. As...
With new technologies appearing almost daily, attackers have a constant stream of potential new tools, tactics and practices to evaluate as offensive weapons. This constantly expanding attack surface forces defenders to assess each as well in an ever-escalating arms race.
But this can cause an over-dependence on...
The Department of Veterans Affairs is in the midst of an IT transformation that spotlights security efforts ranging from enforcing the use of two-factor authentication to reducing privileged access accounts, says a new mid-year report.
The federal tally of major health data breaches shows that to-date in 2016, there have been more reported hacker incidents than during the first half of 2015. However, so far this year, those hacks appear to be affecting fewer individuals.
Forget the 2015 mega-breach, an ongoing FTC probe or multiple class-action lawsuits: A new leadership team wants to reboot infidelity-focused online dating website Ashley Madison, promising that this time they'll get security and privacy right.
One of the core values of the cybersecurity framework is to facilitate communication among various stakeholders coming from different technical and managerial backgrounds who must collaborate to build secure IT systems, NIST Program Manager Matt Barrett explains in an interview.
Healthcare entities should take several critical steps to minimize the security risks posed by older, legacy medical devices used in their organizations, says medical device cybersecurity expert Kevin Fu.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.